Multiple CVE's are present in the latest release of the TUSD docker image. We detected these via AWS Inspector, which runs on our container regitry, where we cache TUSD in a pull-through configuration from Dockerhub.
This can be verified independently with the Docker scout tool if Docker Desktop is installed:
➜ ~ docker scout cves tusproject/tusd:v2.8.0
✓ Pulled
✓ Image stored for indexing
✓ Indexed 151 packages
✓ Provenance obtained from attestation
✗ Detected 6 vulnerable packages with a total of 47 vulnerabilities
## Overview
│ Analyzed Image
───────────────────┼──────────────────────────────────────────────────────────────────────────
Target │ tusproject/tusd:v2.8.0
digest │ 2047eda72f63
platform │ linux/arm64
provenance │ https://github.com/tus/tusd.git#0e52ad650abed02ec961353bb0c3c8bc36650d2c
│ 0e52ad650abed02ec961353bb0c3c8bc36650d2c
vulnerabilities │ 3C 14H 27M 3L
size │ 30 MB
packages │ 151
The critical CVSS scores are found amongst the Golang stdlib:
2C 7H 12M 1L stdlib 1.24.1
pkg:golang/stdlib@1.24.1
As well as the openssl version for alpine 3.21:
1C 4H 8M 0L openssl 3.3.3-r0
pkg:apk/alpine/openssl@3.3.3-r0?os_name=alpine&os_version=3.21
The head commit of the main branch currently specifies FROM --platform=$BUILDPLATFORM golang:1.25.6-alpine AS builder, and I can see that dependabot PR's have been merged regularly, they just havent been published to Dockerhub outside of the per commit SHA-xyz images, which aren't a preferable version to deploy to production.
A recent issue was opened in October, asking for a new release to be published, but it was closed as completed without action (#1321) and 2.8.0 was cut last year in April, which is a long time in the world of security!
Would it be possible to have a patch release built and published to Dockerhub (v2.8.1 ?) to mitigate these underlying build chain and OS vulnerabilities?
Many thanks!
Multiple CVE's are present in the latest release of the TUSD docker image. We detected these via AWS Inspector, which runs on our container regitry, where we cache TUSD in a pull-through configuration from Dockerhub.
This can be verified independently with the Docker scout tool if Docker Desktop is installed:
The critical CVSS scores are found amongst the Golang stdlib:
As well as the openssl version for alpine 3.21:
The head commit of the main branch currently specifies
FROM --platform=$BUILDPLATFORM golang:1.25.6-alpine AS builder, and I can see that dependabot PR's have been merged regularly, they just havent been published to Dockerhub outside of the per commitSHA-xyzimages, which aren't a preferable version to deploy to production.A recent issue was opened in October, asking for a new release to be published, but it was closed as completed without action (#1321) and 2.8.0 was cut last year in April, which is a long time in the world of security!
Would it be possible to have a patch release built and published to Dockerhub (v2.8.1 ?) to mitigate these underlying build chain and OS vulnerabilities?
Many thanks!